A Simple and Efficient Image Pre-processing for QR Decoder
|
|
- Aubrey Pearson
- 7 years ago
- Views:
Transcription
1 A Simple and Efficient Image Pre-processing for QR Decoder Weibing Chen 1,a, Gaobo Yang 2,b and Ganglin Zhang 1,c 1 Dept. of Electrics & Communication Engineering, Changsha University, Changsha Hunan, , P. R. China 2 School of Information Science and Engineering, Hunan University, Changsha Hunan, , P. R. China a cwb680625@sina.com, b yanggaobo@hnu.edu.cn, c ccsuhfj@163.com Keywords: 2D barcode; Quick Response; image preprocessing; localization; binarization Abstract. In order to lower the consumed threshold, a practical image preprocessing method was proposed for Quick Response (QR) barcode recognition. It could increase the speed of recognition by this decoder so as to embed this algorithm into mobile terminals. Instead of using the traditional methods such as edge detection and line detection, the encoding characteristic of QR had been used, thus the influence by background noise and geometric distortion was minimized. Moreover, it used alignment patterns to adaptively sample the barcode in terms of regions, which greatly improved the recognition rate. Experimental results demonstrate that the proposed approach can overcome the influence in noise, inhomogeneous light and geometric distortion, what is more, it meets the requirement of decoding in real time. Introduction QR code is a kind of matrix 2D (two-dimensional) barcode designed by Denso-Wave Corporation of Japan in Its benefits are high-speed recognition, strong error-correcting capability, effectual expression for Chinese characters and all-directional recognition. Due to the influence of capturing environment and resolution, these 2D barcode images captured by scanner, digital camera, or camera head have some shortcomings, such as spherical distortion, geometric distortion, image blurring, and inhomogeneous light. Furthermore, 2D barcode is even partly defiled so that it is encoded in error or can t be recognized. In order to increase the reliability of recognition for 2D barcode, the captured images must be pre-preprocessed [1]. In reference literatures about barcode recognition [2], most of them adopt such conventional method: The first step is resolving the angle of deflection by edge detection and Hough transform, then rotating the image to keep horizontal, and lastly implementing bilinear interpolation for the image. However, because this kind of method is excessively rely on edge detection and line detection based-on Hough transform, the recognition will often be failing in addressing when the QR code image has serious geometric distortion. In additional, Ming et al. [3] proposed a technique to eliminate the illegible effect by the binarization with self-adaptive threshold according to the features of defocused QR code image. The corner points are initially located by contour search algorithms, and a QR code image is rebuilt from a distorted one by using a double tangent method designed to approximate the right-bottom point with double inverse perspective transformations. Xiao et al. [4] held the point that the bilinear transform is referred for the rectification of geometry distortion of QR Code images. Then with the research in the characters of QR code symbols, a simple, effective and high-speed method of localization and orientation is brought up. The common disadvantage of these methods is that they need so much floating point calculation as to effect recognition speed. In recent years, 2D barcode services based on mobile terminal have been widely used. However, the most of algorithms are too complex to be used in embedding mode. In this paper, for the sake of lowering the threshold of QR code, a low-complexity and practical image pre-processing algorithm is researched for QR barcode recognition according to its design feature. This algorithm is easy to be embedded into mobile terminals. 0234
2 Structure and Decoder Procedure of QR Code As shown in Fig. 1, a QR code symbol is a square array which consists of some square modules. It comprises an encoding region and a function region (includes finder patterns, separator symbols, timing patterns and alignment patterns). Function region shall not be used for the encoding data. The surrounding region of a QR code symbol is blank space. The finder patterns (includes three probing patterns) located at three corners of the symbol intend to assist in easy location of its position, size and inclination. There are separator symbols width as a module between each probing pattern and the encoding region. All of them consist of light modules. The functions of timing patterns are determining the density and version of QR Code symbol, and providing the reference position which can decide coordinates of modules. The specific encoding standard of QR code is detailed in Ref.[5]. Blank Space Finder Patterns Separator Symbols Timing Patterns Alignment Patterns Format Information Version Information Data and Error Correction Keys Figure 1. The structure of QR code symbol The structure features of QR code symbol must be adequately used in its decoder procedure. The flow chart of QR code recognition is shown as Fig. 2. It mainly includes follow steps: Binarization; Obtain the approximate region of QR code, and implement coarse positioning for QR image according to the finder patterns; Implement accurate positioning according to the alignment patterns; Calculate the angle of inclination to rotate QR image, and implement rectification processing; Obtain version number and implement self-adaptive sampling; Decode based on corrected image and input a standard 2D matrix. Function Region Encoding Region Binarization Location, find three finder patterns Affine transformatio Obtain preliminary version number Version decode Input code stream Format decode Sample, create bit stream Calculate information of region alignment Search alignment patterns Image Pre-processing Algorithm of QR Code Figure 2. The decoder flow chart of QR code Binarization. Many algorithms may be used for image binarization [6]. Binarization is the base of QR code decoding and directly influences the recognition rate of QR code. However, it must keep balance between real-time and effects. In this paper, dynamic iterations method is used to implement dimensional histogram statistic for inputted grey-scale image data and obtain the optimal threshold value. Then, this threshold value can be used to implement binarization processing for the image. Supposing T(i) as a new separator threshold value, V 1 (i)as the mean gray value of pixels which gray values are less than T(i), and V 2 (i)as the mean gray value of pixels which gray values are more than T(i), its iterations processing includes following steps: T(0)=128; T(i+1)=[V 1 [T(i)+V 2 [T(i)]]/2; Return prior step. If T(i+1)=[V 1 [T(i+1)+V 2 [T(i+1)]]/2, then exit this iterations processing, where T(i) is the calculated optimal threshold value for binarization. 0235
3 Localization of QR Code. The localization of QR code gets help from finder patterns of its most marked feature. According to the international standard of QR code encoding, Finder patterns may be obtained from the relationship which the ratio between black blocks and white blocks is 1:1:3:1:1. Therefore, we can scan whole image to obtain the center positions of three finder patterns. Steps as follows: Scan the pixels of each row (in order to increase recognition rate, it can be scanned once interval several rows), and record the length of black blocks and white blocks, then judge whether black : white : black : white : black equals to 1:1:3:1:1 in each row. If a row is the same with this ratio, move the reading image pointer on to the row center position of this middle black block, and measure the length of a white block and a black block by extending respectively toward up and down, and then judge whether the ratio between five black blocks and white blocks is also 1:1:3:1:1. If its column is also the same with this ratio, it is similar with finder pattern. In order to try more verifies for this point, adjust this cross-point of row and column scan line on to the center position of black block, and then play next step. Considering that single judgment condition isn t suitable for different distortion images, thus, it would be three judgment conditions are used in turn by controlling with variable pimgcounter : (1) case 0: the length ratio between back blocks and white blocks is 1:1:3:1:1 in transverse and vertical directions, and is also 1:1:3:1:1 in diagonal directions; (2) case 1: the length ratio between back blocks and white blocks is 1:1:3:1:1 in transverse and vertical directions, and the ratio between left diagonal line and right diagonal line is 1:1; (3) the ratio between transverse line and vertical line is 1:1, and the length ratio between back blocks and white blocks is 1:1:3:1:1 in left and right diagonal directions. According with the judgment condition, the pattern can be regarded as a finder pattern. The specific finding processing is shown as Fig. 3. a. Row scanning b. Column scanning c. Adjusting to center position Figure 3. The search path of finder patterns Geometric Rectification. Geometric rectification refers to follow processing: when an image occurs geometric distortion, for example, QR code occurs gradient by an unsuitable shooting angle, the image is corrected to a square. Due to knowing image s three peaks by prior location of finder patterns, we can use the affine transformation formula with six parameters to implement geometric rectification for image, and obtain new image data. The effect of geometric rectification based on affine transformation is shown as Fig. 4. It is remarkable that the QR code after geometric rectification possibly is not a true square and still has a few of distortions. Especially in the case of trapezoidal distortion, the distortion in top left corner could be minimum, and the distortion in lower right corner is maximum. It needs more treatments in following sample processing. Figure 4. Affine transformation Localization of Alignment Patterns. After the localization of finder patterns, it is easily to get the height and width of each finder pattern. Then divided by 42 after add them together. The result would be average width of modules. Lastly the version number also can be obtained. The QR codes which version number is greater than 2 have alignment patterns. Shown as Fig. 1, so-called alignment pattern refers to a square region which ratio between blacks and whites is 1: 1: 1: 1: 1. Then, versions from 2 to 6 will be taken example for illustrating the search and localization of alignment patterns. Steps as follows: 0236
4 Estimate the approximate position of alignment patterns by version number. Move image pointer near to this point, and search the center coordinate of a corrected image. If this center can be found, then return to this point; if it can not be found within the specific region, then take estimation value as standard. Calculate the center coordinates of three finder patterns, and the widths of vertical module and transverse module of the quadrangle comprised of alignment patterns. The center point is respectively moved the width of 3 transverse modules toward left and the width of 3 vertical modules. Then the fourth point can be obtained. According to the quadrangle comprised of the center coordinates of three finder patterns and the fourth point, the distortion degree from left to right and from up to down can be estimated. The method of accurate localization for alignment patterns as follows: First judge whether the estimated point is black. If it is black, then judge whether there are over 7 white points in 8 adjacent modules around it. However, if this condition is satisfied, then the estimated point can be regarded as located within alignment patterns. On next step, directly adjust this pointer on to center position and return. If above method is failure, then the estimated point can be regarded as located outside the center module of alignment patterns. On next step, search in 3 adjacent left and right modules. There, the judgment conditions of alignment pattern are follows: (1) whether this point is black; (2) whether there are over 7 white points in 8 adjacent modules around this point; (3) whether there are over 14 black points in 16 adjacent modules around this point. In Fig. 5 (a), the sampling region and alignment patterns numbers of version 14 are shown. With region alignment information, subsequent sampling grids can be equably distributed in a region, and sampling can be implemented in the region between alignment patterns. Figure 5. (a) The sampling region and alignment patterns numbers of version 14; (b) The self-adaptive sampling for the QR code with alignment patterns Image Sampling. Image sampling refers to follow processing: according to located QR code, obtain the version number to determine the size of QR code, and obtain that the bit represented by each grid is 0 or 1. Shown as Fig. 5 (b), how to divide an image into grids is the key point. Considering the QR code image after geometric rectification still has some distortion, thus self-adaptive sampling is implemented in conjunction with alignment patterns. According to the version number of QR code, sampling is implemented in follow 4 cases: Version 1: without alignment pattern, sample in one region; Version 2-6: with only one alignment pattern, sample in one region; Version 7-13: with 6 alignment patterns, respectively sample in 4 regions; Version 14: with 13 alignment patterns, respectively sample in 9 regions. Fig. 5 (b) is the self-adaptive sampling diagram for the QR code with alignment patterns. It is perceptible that the pixels of each grid aren t completely same. How to judge the bit represented by each grid is 0 or 1 has two methods: (1) the ratio between all black pixels and all white pixels in a grid; (2) drawing a + symbol on the center of grid, then judge the ratio between black pixels and white pixels on the cross symbol. In this paper, the second method was applied. Its effect is shown as Fig. 5(a). Experimental results demonstrate that the recognition rate of the second one is a little higher than the first one s. Experimental Results and Discussion 0237
5 To test the effect of this paper algorithm, we realized the encoder and decoder of QR code with Visual C The experiment was performed under the following environment: An ordinary camera i.e. AC650 with USB interface is used. It has 24 bits true color, and its resolution factor may be adjusted from to ; Multiple illumination intensities, such as ordinary light, dim light, floodlight, side light; 5 kind of module widths are applied to simulate the density of QR barcode; To simulate geometric distortion, the distance between camera shot and barcode varies from 8 to 20 cm, and the separation angle between camera plane and barcode plane varies from 45-90, and shooting angle is omnibearing. To simulate a defiled barcode, draw lines on a barcode, and knead the barcode; The error correcting level varies among H (30%), Q (25%), M (15%), and L (7%); The version number varies from 1 to selected barcodes were tested under above conditions. Experimental results demonstrate that the right recognition rate is over 95%, i.e. this paper algorithm can overcome the influence by noise, inhomogeneous light and geometric distortion. The recognition rates under different conditions have small difference. Except encoding content, the main influencing factors are the resolution of camera and error correcting level. General speaking, the recognition time for QR image with or is about 5 ms. It completely meets the requirement of decoding in real time. Compared with the experimental results reported by Ref. [3] and [4] (recognition rate as about 90%, recognition time as about 80 ms), the algorithm mentioned in this paper earns more benefits. Conclusions The image pre-processing algorithm is the key to extend the applied range of 2D barcode and lower used threshold and increase degree in practical. In this paper, a practical image preprocessing method was proposed for QR barcode recognition. It didn t utilize the traditional methods such as edge detection and line detection, thus the influence by background noise and inhomogeneous light and geometric distortion was minimized. In additional, it used alignment patterns to adaptively sample the barcode in terms of regions, which greatly improved the recognition rate. Because the number of calculation of this algorithm is reduced, its recognition speed is higher. But this algorithm was only simulated on PC and not truly tested in embedding system, so further work is the optimization of program codes, and embedding it into mobile terminals, and developing correlative research. Acknowledgment This work is supported in part by the Science and Technology Program of Hunan China under Grant 2011FJ3116. References [1] H. Kato, K.T. Tan: IEEE Pervasive Computing, vol.16(2007), p [2] D.W. Liu: Ocean University of China, Qindao (2008).(in Chinese) [3] A.L. Ming, H.D. Ma, Q.P. Zhao: Journal of Computer-Aided Design & Computer Graphics, vol.19(2007), p (in Chinese) [4] X.Xiao, X.M. Lau, Y.K. Wang: Computer Science, vol.34(2007), p (in Chinese) [5] Y. Liu, M.J. Liu: Proc. of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA'06), p (2006). [6] O.D.Trier: IEEE PAMI, vol.17(1995). p
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System
Automatic Recognition Algorithm of Quick Response Code Based on Embedded System Yue Liu Department of Information Science and Engineering, Jinan University Jinan, China ise_liuy@ujn.edu.cn Mingjun Liu
More informationHow To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
More informationHow To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
More informationA Study of Automatic License Plate Recognition Algorithms and Techniques
A Study of Automatic License Plate Recognition Algorithms and Techniques Nima Asadi Intelligent Embedded Systems Mälardalen University Västerås, Sweden nai10001@student.mdh.se ABSTRACT One of the most
More informationLocating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
More informationSuper-resolution method based on edge feature for high resolution imaging
Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:
More informationBarcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
More informationResearch Article 2D Barcode Image Decoding
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 23, Article ID 848276, pages http://dx.doi.org/.55/23/848276 Research Article 2D Barcode Image Decoding Jeng-An Lin and Chiou-Shann
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationIntelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More informationFace detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
More informationThe Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
More informationResearch on the Anti-perspective Correction Algorithm of QR Barcode
Researc on te Anti-perspective Correction Algoritm of QR Barcode Jianua Li, Yi-Wen Wang, YiJun Wang,Yi Cen, Guoceng Wang Key Laboratory of Electronic Tin Films and Integrated Devices University of Electronic
More informationOpen Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
More informationResearch on Chinese financial invoice recognition technology
Pattern Recognition Letters 24 (2003) 489 497 www.elsevier.com/locate/patrec Research on Chinese financial invoice recognition technology Delie Ming a,b, *, Jian Liu b, Jinwen Tian b a State Key Laboratory
More informationAttendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah
Journal of mathematics and computer science 10 (2014), 189-198 Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Miran Hikmat Mohammed Baban Computer Dept.
More informationLIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK
vii LIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK LIST OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF NOTATIONS LIST OF ABBREVIATIONS LIST OF APPENDICES
More informationWHITE PAPER DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION
DECEMBER 2010 CREATING QUALITY BAR CODES FOR YOUR MOBILE APPLICATION TABLE OF CONTENTS 1 Introduction...3 2 Printed bar codes vs. mobile bar codes...3 3 What can go wrong?...5 3.1 Bar code Quiet Zones...5
More information3D Scanner using Line Laser. 1. Introduction. 2. Theory
. Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric
More informationBernice E. Rogowitz and Holly E. Rushmeier IBM TJ Watson Research Center, P.O. Box 704, Yorktown Heights, NY USA
Are Image Quality Metrics Adequate to Evaluate the Quality of Geometric Objects? Bernice E. Rogowitz and Holly E. Rushmeier IBM TJ Watson Research Center, P.O. Box 704, Yorktown Heights, NY USA ABSTRACT
More informationVisual Product Identification for Blind
RESEARCH ARTICLE OPEN ACCESS Visual Product Identification for Blind Krutarth Majithia*, Darshan Sanghavi**, Bhavesh Pandya***, Sonali Vaidya**** *(Student, Department of Information Technology, St, Francis
More informationBarcodes principle. Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague
Barcodes principle Identification systems (IDFS) Department of Control and Telematics Faculty of Transportation Sciences, CTU in Prague Contents How does it work? Bulls eye code PostNet 1D Bar code 2D
More informationMedical Image Segmentation of PACS System Image Post-processing *
Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China
More informationPoker Vision: Playing Cards and Chips Identification based on Image Processing
Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence
More informationNetwork Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
More informationMonash University Clayton s School of Information Technology CSE3313 Computer Graphics Sample Exam Questions 2007
Monash University Clayton s School of Information Technology CSE3313 Computer Graphics Questions 2007 INSTRUCTIONS: Answer all questions. Spend approximately 1 minute per mark. Question 1 30 Marks Total
More informationAn Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
More informationCreate a Poster Using Publisher
Contents 1. Introduction 1. Starting Publisher 2. Create a Poster Template 5. Aligning your images and text 7. Apply a background 12. Add text to your poster 14. Add pictures to your poster 17. Add graphs
More informationAlgorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers
Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers Isack Bulugu Department of Electronics Engineering, Tianjin University of Technology and Education, Tianjin, P.R.
More informationBuilding an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
More informationProjection Center Calibration for a Co-located Projector Camera System
Projection Center Calibration for a Co-located Camera System Toshiyuki Amano Department of Computer and Communication Science Faculty of Systems Engineering, Wakayama University Sakaedani 930, Wakayama,
More informationRelating Vanishing Points to Catadioptric Camera Calibration
Relating Vanishing Points to Catadioptric Camera Calibration Wenting Duan* a, Hui Zhang b, Nigel M. Allinson a a Laboratory of Vision Engineering, University of Lincoln, Brayford Pool, Lincoln, U.K. LN6
More informationLow-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
More informationEnhanced Bar Code Engine
Enhanced Bar Code Engine Introduction Access to the Kofax Standard bar code recognition engine is provided through ImageControls-based applications and ISIS-based applications. In addition to the standard
More informationA Study on M2M-based AR Multiple Objects Loading Technology using PPHT
A Study on M2M-based AR Multiple Objects Loading Technology using PPHT Sungmo Jung, Seoksoo Kim * Department of Multimedia Hannam University 133, Ojeong-dong, Daedeok-gu, Daejeon-city Korea sungmoj@gmail.com,
More informationInstallation and Operating Instructions for the FluidX IntelliCode software Rev 1, release date: July 2014
Installation and Operating Instructions for the FluidX IntelliCode software Rev 1, release date: July 2014 FluidX Ltd. Monks Heath Hall, Chelford Road, Nether Alderley, Cheshire, SK10 4SY, UK. T: +44(0)
More informationVECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION
VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION Mark J. Norris Vision Inspection Technology, LLC Haverhill, MA mnorris@vitechnology.com ABSTRACT Traditional methods of identifying and
More informationDatabase Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 05) Database Modeling and Visualization Simulation technology Based on Java3D Hongxia Liu Department of Electronic
More informationPotential of face area data for predicting sharpness of natural images
Potential of face area data for predicting sharpness of natural images Mikko Nuutinen a, Olli Orenius b, Timo Säämänen b, Pirkko Oittinen a a Dept. of Media Technology, Aalto University School of Science
More informationPalmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
More informationSIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
More informationUsing Microsoft Word. Working With Objects
Using Microsoft Word Many Word documents will require elements that were created in programs other than Word, such as the picture to the right. Nontext elements in a document are referred to as Objects
More informationDemonstration of Barcodes to QR Codes through Text Using Document Software
Demonstration of Barcodes to QR Codes through Text Using Document Software Dr. Neeraj Bhargava 1, Anchal kumawat 2, Dr. Ritu Bhargava 3 Associate Professor, Department of Computer Science, School of Engineering
More informationA Study on the Actual Implementation of the Design Methods of Ambiguous Optical Illusion Graphics
A Study on the Actual Implementation of the Design Methods of Ambiguous Optical Illusion Graphics. Chiung-Fen Wang *, Regina W.Y. Wang ** * Department of Industrial and Commercial Design, National Taiwan
More informationHigh-Performance Signature Recognition Method using SVM
High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of
More informationApplication of Data Matrix Verification Standards
Data Matrix symbol verification at its most basic level eliminates the subjective quality determination that causes discord between marking and reading suppliers, and replaces those subjective opinions
More informationGalaxy Morphological Classification
Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,
More informationInvestigation of Color Aliasing of High Spatial Frequencies and Edges for Bayer-Pattern Sensors and Foveon X3 Direct Image Sensors
Investigation of Color Aliasing of High Spatial Frequencies and Edges for Bayer-Pattern Sensors and Foveon X3 Direct Image Sensors Rudolph J. Guttosch Foveon, Inc. Santa Clara, CA Abstract The reproduction
More informationManual for simulation of EB processing. Software ModeRTL
1 Manual for simulation of EB processing Software ModeRTL How to get results. Software ModeRTL. Software ModeRTL consists of five thematic modules and service blocks. (See Fig.1). Analytic module is intended
More informationQUALITY TESTING OF WATER PUMP PULLEY USING IMAGE PROCESSING
QUALITY TESTING OF WATER PUMP PULLEY USING IMAGE PROCESSING MRS. A H. TIRMARE 1, MS.R.N.KULKARNI 2, MR. A R. BHOSALE 3 MR. C.S. MORE 4 MR.A.G.NIMBALKAR 5 1, 2 Assistant professor Bharati Vidyapeeth s college
More informationConstrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume *
Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume * Xiaosong Yang 1, Pheng Ann Heng 2, Zesheng Tang 3 1 Department of Computer Science and Technology, Tsinghua University, Beijing
More informationHandwritten Character Recognition from Bank Cheque
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*
More informationRobot Perception Continued
Robot Perception Continued 1 Visual Perception Visual Odometry Reconstruction Recognition CS 685 11 Range Sensing strategies Active range sensors Ultrasound Laser range sensor Slides adopted from Siegwart
More informationPrinted Circuit Board Defect Detection using Wavelet Transform
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Amit
More informationBANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE
BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE Abhishek B. Iyer G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India- 412 207 Rohit A. Shah G.H.Raisoni College
More informationPaper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
More informationCHAPTER I INTRODUCTION
CHAPTER I INTRODUCTION 1.1 Introduction Barcodes are machine readable symbols made of patterns and bars. Barcodes are used for automatic identification and usually are used in conjunction with databases.
More informationREAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
More informationELFRING FONTS INC. MICR FONTS FOR WINDOWS
ELFRING FONTS INC. MICR FONTS FOR WINDOWS This package contains ten MICR fonts (also known as E-13B) used to print the magnetic encoding lines on checks, and eight Secure Fonts for use in printing check
More informationAPPLICATION OF HOUGH TRANSFORM AND SUB-PIXEL EDGE DETECTION IN 1-D BARCODE SCANNING
APPLICATION OF HOUGH TRANSFORM AND SUB-PIXEL EDGE DETECTION IN 1-D BARCODE SCANNING Harsh Kapadia 1, Alpesh Patel 2 Assistant Professor, Dept. of Electrical Engg., Institute of Technology, Nirma University,
More information(I) s(t) = s 0 v 0 (t t 0 ) + 1 2 a (t t 0) 2 (II). t 2 = t 0 + 2 v 0. At the time. E kin = 1 2 m v2 = 1 2 m (a (t t 0) v 0 ) 2
Mechanics Translational motions of a mass point One-dimensional motions on the linear air track LD Physics Leaflets P1.3.3.8 Uniformly accelerated motion with reversal of direction Recording and evaluating
More informationA technical overview of the Fuel3D system.
A technical overview of the Fuel3D system. Contents Introduction 3 How does Fuel3D actually work? 4 Photometric imaging for high-resolution surface detail 4 Optical localization to track movement during
More informationThe Visualization Simulation of Remote-Sensing Satellite System
The Visualization Simulation of Remote-Sensing Satellite System Deng Fei, Chu YanLai, Zhang Peng, Feng Chen, Liang JingYong School of Geodesy and Geomatics, Wuhan University, 129 Luoyu Road, Wuhan 430079,
More informationA method of generating free-route walk-through animation using vehicle-borne video image
A method of generating free-route walk-through animation using vehicle-borne video image Jun KUMAGAI* Ryosuke SHIBASAKI* *Graduate School of Frontier Sciences, Shibasaki lab. University of Tokyo 4-6-1
More informationDefect Detection of SMT Electronic Modules
Appl. Math. Inf. Sci. 7, No. 2, 515-520 (2013) 515 Applied Mathematics & Information Sciences An International Journal Defect Detection of SMT Electronic Modules Xibing Li 1 and Jianjia Wang 2 1 School
More informationRecognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
More informationA Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
More informationw w w. g e o s o f t. c o m
SEG-Y Reader Convert SEG-Y files to: Windows BMP, Geosoft Grid, Geosoft Database, Geosoft Voxel USER GUIDE w w w. g e o s o f t. c o m SEG-Y Reader SEG-Y Reader reads 2D and 3D SEG-Y format data files
More informationText/Graphics Separation for Business Card Images for Mobile Devices
Text/Graphics Separation for Business Card Images for Mobile Devices A. F. Mollah +, S. Basu *, M. Nasipuri *, D. K. Basu + School of Mobile Computing and Communication, Jadavpur University, Kolkata, India
More informationVery Low Frame-Rate Video Streaming For Face-to-Face Teleconference
Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Jue Wang, Michael F. Cohen Department of Electrical Engineering, University of Washington Microsoft Research Abstract Providing the best
More informationUSING TRIANGULATIONS IN COMPUTER SIMULATIONS OF GRANULAR MEDIA
USING TRIANGULATIONS IN COMPUTER SIMULATIONS OF GRANULAR MEDIA DIDIER MÜLLER, THOMAS M. LIEBLING EPFL-DMA, 1015 Lausanne, Switzerland ABSTRACT The distinct element method used to simulate behavior of granular
More informationEffective Use of Android Sensors Based on Visualization of Sensor Information
, pp.299-308 http://dx.doi.org/10.14257/ijmue.2015.10.9.31 Effective Use of Android Sensors Based on Visualization of Sensor Information Young Jae Lee Faculty of Smartmedia, Jeonju University, 303 Cheonjam-ro,
More informationAssessment of Camera Phone Distortion and Implications for Watermarking
Assessment of Camera Phone Distortion and Implications for Watermarking Aparna Gurijala, Alastair Reed and Eric Evans Digimarc Corporation, 9405 SW Gemini Drive, Beaverton, OR 97008, USA 1. INTRODUCTION
More informationA System for Capturing High Resolution Images
A System for Capturing High Resolution Images G.Voyatzis, G.Angelopoulos, A.Bors and I.Pitas Department of Informatics University of Thessaloniki BOX 451, 54006 Thessaloniki GREECE e-mail: pitas@zeus.csd.auth.gr
More informationAutomatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
More informationHow To Write An Analysis System For Bridge Test
Study of Analysis System for Bridge Test Chen Ke, Lu Jian-Ming, Research Institute of Highway, 100088, Beijing, China (chenkezi@163.com, lujianming@263.net) Summary Analysis System for Bridge Test (Chinese
More informationGuide To Creating Academic Posters Using Microsoft PowerPoint 2010
Guide To Creating Academic Posters Using Microsoft PowerPoint 2010 INFORMATION SERVICES Version 3.0 July 2011 Table of Contents Section 1 - Introduction... 1 Section 2 - Initial Preparation... 2 2.1 Overall
More informationWii Remote Calibration Using the Sensor Bar
Wii Remote Calibration Using the Sensor Bar Alparslan Yildiz Abdullah Akay Yusuf Sinan Akgul GIT Vision Lab - http://vision.gyte.edu.tr Gebze Institute of Technology Kocaeli, Turkey {yildiz, akay, akgul}@bilmuh.gyte.edu.tr
More informationEfficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 13, NO. 2, JUNE 2015 97 Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding Wei-Hsiang Chang, Mei-Juan Chen, Gwo-Long
More informationThe application of image division method on automatic optical inspection of PCBA
1 1 1 1 0 The application of image division method on automatic optical inspection of PCBA Min-Chie Chiu Department of Automatic Control Engineering Chungchou Institute of Technology, Lane, Sec. 3, Shanchiao
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationStudy on Optimization of Mobile Data Visualization Algorithm Wenwen Liu 1,a
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) Study on Optimization of Mobile Data Visualization Algorithm Wenwen Liu 1,a 1 School of Computer Science and
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationPersonal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES
Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES 1.0 SCOPE AND PURPOSE These specifications apply to fingerprint capture devices which scan and capture
More informationJ. P. Oakley and R. T. Shann. Department of Electrical Engineering University of Manchester Manchester M13 9PL U.K. Abstract
A CURVATURE SENSITIVE FILTER AND ITS APPLICATION IN MICROFOSSIL IMAGE CHARACTERISATION J. P. Oakley and R. T. Shann Department of Electrical Engineering University of Manchester Manchester M13 9PL U.K.
More informationMachine vision systems - 2
Machine vision systems Problem definition Image acquisition Image segmentation Connected component analysis Machine vision systems - 1 Problem definition Design a vision system to see a flat world Page
More informationHow To Use Trackeye
Product information Image Systems AB Main office: Ågatan 40, SE-582 22 Linköping Phone +46 13 200 100, fax +46 13 200 150 info@imagesystems.se, Introduction TrackEye is the world leading system for motion
More informationScanners and How to Use Them
Written by Jonathan Sachs Copyright 1996-1999 Digital Light & Color Introduction A scanner is a device that converts images to a digital file you can use with your computer. There are many different types
More informationReal Time Multiple License Plates Localization and Distortion Normalization for Moving Vehicles
Real Time Multiple License Plates Localization and Distortion Normalization for Moving Vehicles Chen-Chung Liu, Chih-Chin Chang Department of Electronic Engineering, Department of Electronic Engineering,
More informationRobust and accurate global vision system for real time tracking of multiple mobile robots
Robust and accurate global vision system for real time tracking of multiple mobile robots Mišel Brezak Ivan Petrović Edouard Ivanjko Department of Control and Computer Engineering, Faculty of Electrical
More information096 Professional Readiness Examination (Mathematics)
096 Professional Readiness Examination (Mathematics) Effective after October 1, 2013 MI-SG-FLD096M-02 TABLE OF CONTENTS PART 1: General Information About the MTTC Program and Test Preparation OVERVIEW
More informationLOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
More informationParametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
More informationChapter 19. General Matrices. An n m matrix is an array. a 11 a 12 a 1m a 21 a 22 a 2m A = a n1 a n2 a nm. The matrix A has n row vectors
Chapter 9. General Matrices An n m matrix is an array a a a m a a a m... = [a ij]. a n a n a nm The matrix A has n row vectors and m column vectors row i (A) = [a i, a i,..., a im ] R m a j a j a nj col
More informationShear :: Blocks (Video and Image Processing Blockset )
1 of 6 15/12/2009 11:15 Shear Shift rows or columns of image by linearly varying offset Library Geometric Transformations Description The Shear block shifts the rows or columns of an image by a gradually
More informationQR Codes and Other Symbols Seen in Mobile Commerce
QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,
More informationUltra-High Resolution Digital Mosaics
Ultra-High Resolution Digital Mosaics J. Brian Caldwell, Ph.D. Introduction Digital photography has become a widely accepted alternative to conventional film photography for many applications ranging from
More informationSignature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
More information4) How many peripheral devices can be connected to a single SCSI port? 4) A) 8 B) 32 C) 1 D) 100
FALL 07-08 COMP100 MIDTERM-2 EXAM /FACULTY OF ECON. AND ADMINISTRATIVE SCIENCES OF EUL Student Registration No: Instructor: Prof.Dr.Hüseyin Oğuz Student Name-Surname: Dept. of Computer Information Systems
More information